Monthly Compliance Training: Protecting Your Clients’ Privacy

Slides:



Advertisements
Similar presentations
HIPAA Health Insurance Portability and Accountability Act of 1996
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Review Questions Business 205
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Module: 202 Create and Manage a SHOP Account. It is recommended that Agents, assisting Employers with Setup and Plans in NMHIX, take this course.
Data Protection Act. Lesson Objectives To understand the data protection act.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
ONE® Pages Training Presentation North York General Hospital.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Privacy Act United States Army (Managerial Training)
Society & Computers PowerPoint
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Healthcare Marketplace November 1, 2017 thru December 15, 2017
Lesson 10A: The Three D’s of Identify Theft
HIPAA Privacy Rule Training
Protecting PHI & PII 12/30/2017 6:45 AM
Monthly Compliance Training
Attention Identity theft Definition
Protection of CONSUMER information
2015 Orientation to HIPAA Privacy Rule Compliance
Protecting Your Identity:
HIPAA Basic Training for Privacy and Information Security
When you get caught for Identity Theft
Information on Types of Electronic Banking
Societal Issues in Computing (COMP466)
Protecting Your Identity:
Cyber Issues Facing Medical Practice Managers
Protecting Your Credit
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
ONE® Pages Training Presentation
Why sbs? Double your residual income. Has a high retention rate.
Understanding Your Paycheck and Tax Forms
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Protecting Yourself from Fraud including Identity Theft
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Are You Totally Protected?.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
HIPAA Overview.
The Health Insurance Portability and Accountability Act
HIPAA & PHI TRAINING & AWARENESS
Lesson 3: Medical Records
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Online Safety: Rights and Responsibilities
Columbus State’s Benefit Enrollment Portal (BenefitFocus)
Move this to online module slides 11-56
Protecting Yourself from Fraud including Identity Theft
Colorado “Protections For Consumer Data Privacy” Law
Protecting Student Data
School of Medicine Orientation Information Security Training
Presentation transcript:

Monthly Compliance Training: Protecting Your Clients’ Privacy April 2017 HMIAT004093

Objectives By the end of this course, you will be able to: Know what is considered a Privacy Breach Know the top 3 Privacy Breaches committed by agents Know what information is required for insurance company records Know what information an agent should and should not retain for their records Know how to properly destroy documents containing your client’s private and secured information

An Agent’s Trust Trust is: An essential tool to building a good business Letting clients know the pros and cons when making insurance choices Helping clients choose the right coverage fitting their needs and budget Being transparent in presenting all of the facts Protecting the client’s personal health information and identity from privacy breaches

PHI PII Key Terminology Protected Health Information Personal Identifying Information

Be Aware What is considered a privacy breach? Examples include: Replying to an unsecure email containing PHI Using a device for HealthMarkets business without encryption Verbally communicating PHI in a public setting Where is your client’s personal information stored? Carrier portal CRM State/Federal exchange If you store client information, electronic or paper, you need to know what to keep and what to destroy properly

Protecting Private Information Agents must secure PHI and PII, including: Encrypting any device used to conduct HealthMarkets business Agents must report any theft containing clients’ private information to local police within 24 hours Agents must report a privacy breach within 24 hours to Agency Standards including the following details to AgencyComplianceQuestions@HealthMarketsHQ.com: Who? What? When? How? Where?

Information Retention

Insurance Company vs. Agent Needs Insurance Company Needs Agent Needs Bank Routing & Account Numbers Name(s) of Insured Direct Deposit Address Salary/Income Phone Number Social Security Number E-mail Credit/Debit Card & Security Code Type of Coverage Reason for Product Choice(s) Previous Coverage and Carrier(s) Reason for Product Choice(s) Examples: Jane Smith wanted a plan including her doctors in their network so she chose the carrier’s PPO plan instead of the HMO plan Jim Jones wanted an accident plan, because he has 3 children under the age of 10 that play sports Sally Brown wanted health insurance with a low deductible, because she was hospitalized and used her savings to help pay the high deductible she had last year

Protecting Financial Information Numerous complaints have been received where a client alleges bank or credit card information was provided to the agent when they applied for health insurance, and the agent used the information to submit an application for supplemental coverage the client did not need or request The allegations were substantiated, because: An email or other communication was provided by the client demonstrating the agent requested the financial information The agent conducted the sales presentation over the phone and entered the financial information on the application instead of the client If the proper process is followed, the agent would not have the client’s financial information stored to use at a later time to enroll the customer in additional coverage without their knowledge

Protecting Financial Information Agents have told Agency Standards financial information is requested to help the client set up premium payments Client premium payments should be done during the application process while the client is present, and agents should not retain the secured financial information Certain insurance companies may require Social Security Numbers during the application process; however, agents should not keep the information in their records

Why can’t an agent retain payment information? Security laws exist with specific requirements for any individual who obtains/retains certain financial information When financial information is required for premium payment, the insurance company’s expectation is the client is present, the agent is entering it in as the client recites it, and the agent is not retaining the information The practice of retaining a client’s financial information when not required puts the agent’s intent in question, especially when the client alleges their identify was compromised

The Top 3 Reasons for Privacy Breaches Unsecured email responses Unencrypted devices Publicized personal identifying information

#1: Unsecured Email Responses Agents who reply to an email containing private information, even if unsolicited, create a privacy breach resending information through unsecure means To let a client know their communication was received, create a new email to ensure privacy is not breached

Scenario 1: Unsecured Email Responses A client emails the following information to their agent they believe is needed to enroll them in health insurance: Name Date of birth Social security number Height Weight The agent replies back to the client: “I received your information below; and if I need anything else, I will contact you.” Did the agent breach private information even though the information was unsolicited from the client?

#2: Unencrypted Devices Agents fail to take required measures to secure and protect personal health and identifiable information stored on computers, laptops, tablets and smart phones with appropriate encryption software Keeping equipment such as a laptop or smart phone on your person is a very good safeguard, but lost and stolen merchandise is the reason for the encryption requirement and why agents must attest annually they have taken the appropriate security measures

Scenario 2: Unencrypted Devices An agent, who always keeps their unencrypted laptop on their person, was robbed. During the robbery, the agent’s laptop was stolen. The laptop contained client information, such as: Name Date of birth Address Policy numbers for various insurance companies Claim details Did the agent breach private information, even though being robbed was outside of their control?

#3: Publicized Personal Identifying Information Customers take their personal and private information seriously. Complaints have been received from customers alleging an agent verbally communicated their private information in a public setting Face to Face sales presentations are always preferred. Therefore, agents should be aware of their surroundings and ensure unauthorized individuals cannot overhear protected information

Scenario 3: Publicized Personal Identifying Information An agent meets their client at a small local café with limited space where their chair bumps into the next table when repositioning The agent summarizes the presentation and verbally states: “The plan is for you and your husband.” “It’s a silver plan with a moderate deductible and copay.” “The plan has benefits for chemical dependency.” “You qualify for a federal subsidy.” Did the agent breach private or protected information?

How to Properly Destroy PII or PHI Protecting your client’s private information includes properly destroying it when it is not required Don’t throw private information in the trash where others could possibly see or retrieve Don’t store it on electronic devices that could be resold, lost, or stolen How to protect clients when destroying PHI and PII: Delete electronic copies located in your email, folders on your laptop/tablet, or pictures on your smartphone. Hard copies should be shredded or placed in a secured and locked bin that is removed by an authorized individual/company

Report It It is your responsibility as an agent to report unethical or non-compliant activity Contact: Email: Agency.Standards@HealthMarketsHQ.com Report it anonymously: Phone: (toll free) 877-778-5463 Online: https://secure.reportit.net (user name: HMI password: HMI)